jeremykun.com
Sending and Authenticating Messages with Elliptic Curves
Last time we saw the Diffie-Hellman key exchange protocol, and discussed the discrete logarithm problem and the related Diffie-Hellman problem, which form the foundation for the security of most pr…